Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

Communication changes for remote security teams

By Dave George
walkie-talkie-2534576_1920
May 11, 2021

Communication was already a challenge in the security industry with widespread teams or lone personnel in siloed locations. Now that COVID-19 has virtually eradicated in-person interactions and many team members are only working remotely, it is all the more difficult to keep everyone synced.

The entire face of security communications has changed, escalating the need to find alternate ways to connect with the growing remote workforce. Internal and external communications are merging as security companies struggle to manage disconnected teams. 

Remote work now requires mobile communication delivery at an unprecedented level. Security professionals are discovering faster, more effective ways to communicate with simple, plug-and-play digital solutions.

 

App-Powered Patrols

Mobile team communications applications are fast becoming the leading solution across the spectrum, from small businesses who require premise patrolling to large enterprises with multi-layered security systems. App features are more comprehensive than ever with text chats, audio calls, video conferencing, file and screen sharing, discussion threads, forums and more, all combined into one communications hub on a dedicated channel.

Communication platforms can equip both security officers and business owners with video monitoring, camera controls (pan-tilt-zoom), multi-feed displays, video playback, and “snap-and-send” capabilities (video snapshot transmissions)—all from a mobile device. Applications tailored to security services companies provide a feature-rich dashboard with the ability to track guard movements and define “geo-fenced” perimeters that limit the area personnel are allowed to patrol—a function that is particularly important with current social distancing regulations. There are even free apps available that turn a smartphone into a body-worn camera, providing POV video with time, date and location tagging.

However, some security industry professionals have highly specific processes and require more customized communication interfaces. The emergence of no-code/low-code development platforms (LCDP) have made it possible for developers and customers to accelerate delivery of custom applications. Though they can be deployed on virtually any platform, mobile accessibility is a driving factor behind the use of LCDP apps, which allow workers to tap into on-premise or cloud data from a mobile device.

Of course, data security will always be a concern when dealing with sensitive information stored on a variety of different platforms. As more teams work remotely and rely on mobile devices, security risks can be mitigated by the use of Public Key Infrastructure (PKI), either as a cloud service (also referred to as PKIaaS), or by building a privately rooted PKI in house. PKIaaS has become more popular as it provides all the same benefits of in-house PKI but, without the cost and intricacy of running the program internally. In either case, PKI secures and verifies the digital identities of every person, application, or machine—allowing organizations secure access to devices and internal communications.

 

Digital Apps, Networks and Devices 

When security supervisors need to transmit important information in real-time, nothing compares to verbal communications, which are now facilitated by live push-to-talk (PTT) voice messaging, either one-to-one with individuals, or one-to-many with groups. Now there are smartphones with programmable PTT buttons that integrate with walkie talkie apps, providing instant voice communication between personnel without risk of cross-talk or eavesdropping, while also reducing the number of devices guards carry and cutting IT costs. Many feature-rich PTT apps also allow users to complete a variety of other security tasks, such as site tours, GPS location tracking and panic buttons that trigger emergency alerts in critical scenarios---all from a cellular device. The widespread adoption of smartphones and PTT applications clearly indicates these are becoming the predominant communications tools for security workforce management.

In the past, traditional private radio and land mobile radio networks often required significant up-front Capital Expenditures (CAPEX) to install base stations, antennas, routers, and the like. Today, the spike in remote workforces is driving explosive growth in push-to-talk over cellular (PoC) for wide-area communications due to the low Operational Expenditure (OPEX) for startup and subscription-based services.

With the press of a PTT button, PoC provides the same capabilities as traditional two-way radio systems and enables instant group calls to multiple users. Because PoC leverages existing LTE cellular and ubiquitous Wi-Fi networks, systems can be deployed more quickly with no infrastructure required. For security companies, this reduces operating expenditures across the board, from equipment to licensing fees.

PoC network services can be located on privately hosted servers using gateway routers to provide connectivity between the LTE network and the PoC server. Another approach is unified communications (UC) platforms, which integrate diverse radio systems with PoC and PTT over Wi-Fi into one centralized ecosystem.

Communication devices are evolving along with applications and networks. Digital Mobile Radios (DMR) with advanced features can now support PoC functions, including instant group calling, GPS location tracking, emergency notifications, and mission-critical PTT (MCPTT.)  Purpose-built smartphone devices for professional security communications are compact, rugged, easy-to-operate and connect to the cellular network via SIM cards much like traditional cell phones. Some smartphones are even designed to resemble two-way radios, which helps users make the transition to cellular devices, while also presenting a recognizable image to the general public.

Devices are already available on the market that enable the transmission of mission-critical data to and from personnel in the field including, but not limited to, body-worn cameras, fixed and vehicle-mounted cameras, drones, biometric sensors, facial recognition systems and mobile data terminals. Collectively, the data all of these devices provide can equip security personnel with unprecedented situational awareness.

 

Remote Security Teams Support

Many team communication applications are compatible with hands-free PTT and PoC accessories, including headsets and Bluetooth adaptors, which allows freedom of movement when patrolling grounds, completing walk-through security checks, and a host of other physical tasks. A single button push connects field personnel with supervisors or with other team members, which is ideal for security companies with vehicle fleets, as well as for those who work in the property management field.

There are a vast array of accessories available that augment audio and voice quality, from discreet surveillance kits for undercover security teams to throat mics and earmuffs for high noise environments like casinos and entertainment venues. However, there are only a few accessory manufacturers who specialize in making affordable professional-grade products that far surpass most low-cost alternatives. Of course, these days hygiene is also a primary concern, which is why more experienced makers offer swappable accessories specifically designed for individual or one-time use.

In today’s COVID world, coordinating remote security teams is the new reality. Security service providers are striving to raise team communications to a higher level, while also reducing expenses and keeping staff safe. They are demanding simpler, more cost effective solutions that are also dependable and backed by strong support to ensure operations run smoothly and teamwork is optimized. Ultimately, this has created a paradigm shift, which is completely redefining the future of security communications.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: camera security COVID-19 remote workers risk management security communications

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave george high res

Dave George is Chief Technologist and President of Pryme Radio, a premier provider of communications accessories. He holds 29 patents and is the inventor of multiple award-winning products. An RF engineer for over 40 years, George is considered an industry thought leader whose keen insight is renowned in the communications technology field.  daveg@pryme.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-computing-freepik

    Infrastructure shifts to cloud due to remote work expose enterprises to new security threats; Security teams absorb responsibility

    See More
  • SEC0221-Remote-Feat-slide1_900px

    Security teams navigate remote work challenges

    See More
  • cyber professional

    InfoSec teams fight dual battle: Limited visibility and board communication

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!